An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF

Size: px
Start display at page:

Download "An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF"

Transcription

1 An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF Nicolas Mayer 1, Jocelyn Aubert 1, Eric Grandry 1, Christophe Feltus 1 1 Luxembourg Institute of Science and Technology, 5 Avenue des Hauts-Fourneaux, L-4362 Esch-sur-Alzette, Luxembourg {nicolas.mayer, jocelyn.aubert, eric.grandry, christophe.feltus}@list.lu Abstract. Risk management is today a major steering tool for any organization wanting to deal with Information System (IS) security. However, IS Security Risk Management (ISSRM) remains difficult to establish and maintain, mainly in a context of multi-regulations with complex and inter-connected IS. We claim that a connection with Enterprise Architecture Management (EAM) contributes to deal with these issues. According to our research agenda, a first step towards a better integration of both domains is to define an EAM-ISSRM conceptual integrated model. To build such a model, we will improve the ISSRM domain model, a conceptual model depicting the domain of ISSRM, with the concepts of EAM. The contribution of this paper is focused on the improvement of the ISSRM domain model with the concepts of TOGAF, a well-known EAM standard. Keywords: Information Security, Risk Management, Enterprise Architecture, TOGAF, Compliance 1 Introduction Nowadays, Information System (IS) security and Risk Management (RM) are required for every organization that wishes to survive in this networked world. Whether for purely compliance purposes, business development opportunities, or even governance improvement, organizations tend to implement a security strategy based on an IS Security RM (ISSRM) approach. However, organizations have to deal with pressures that increase the complexity of managing security risks: regulatory pressure involving ISSRM requirements [1 3], increasing number of threats and complexity of current IS [6, 7], lack of efficiency in the process followed [1], or difficulty to have a clear and manageable documentation of ISSRM activities [1]. Due to this complexity, new solutions are required to address security risks. Classical ISSRM methods [1, 2] are indeed not suitable to deal with the complexity of organizations and associated risks, in a context of compliance and governance.

2 Enterprise Architecture Management (EAM) has shown to be a valuable and engaging instrument to face enterprise complexity and the necessary enterprise transformation [3, 4]. EAM offers means to govern complex enterprises, such as, for example, an explicit representation of the enterprise facets, a sound and informed decisional framework, a continuous alignment between business and IT, and so forth [5]. By integrating EAM with ISSRM, we aim to be able to deal with the preceding listed issues related to the complexity of organizations and associated risks. In earlier work, we have integrated the concepts of existing ISSRM standards and methods into a domain model, that we called the ISSRM domain model [6]. The goal of our research is to improve this model by extending it to a framework (modelling language, method, and tool) that incorporates results from EAM research [7] and that can be used in practice. A first step is to define an integrated EAM-ISSRM conceptual model which will be called the EAM-ISSRM integrated model. This paper describes part of this work and its contribution is focused on analysing if and how the concepts that are part of TOGAF, a well-known standard in the domain of EAM published by The Open Group [8], can be used to improve the ISSRM domain model. Note that we do not propose a modelling language, although this task is part of our next objectives, but we define an underlying conceptual model for such a language. This model will be a key artefact towards the definition of a dedicated modelling language and of the associated ISSRM method. In the following section, the background of our work is described: it introduces the ISSRM domain model and the TOGAF standard. Section 3 presents the conceptual alignment between the concepts of TOGAF and those of the ISSRM domain model, and then explains the key conclusions. An integrated EAM-ISSRM conceptual model based on TOGAF is proposed in Section 4. Section 5 is a comparison with related work. Finally, conclusions and future work are presented in Section 6. 2 Background 2.1 The ISSRM Domain Model In our preceding work, the concepts of ISSRM have been represented as a domain model, i.e. a conceptual model depicting the studied domain [6]. The ISSRM domain model was designed from related literature [1]: risk management standards, securityrelated standards, security risk management standards and methods, and security requirements engineering frameworks. The ISSRM domain model is composed of 3 groups of concepts: Asset-related concepts, Risk-related concepts, and Risk treatmentrelated concepts. Each of the concepts of the model has been defined and linked one to the other, as represented in Fig. 1. Asset-related concepts (light grey boxes) describe assets and the criteria which guarantee asset security. An asset is anything that has value to the organization and is necessary for achieving its objectives. A business asset describes information, processes, capabilities, and skills inherent to the business and core mission of the organization, having value for it. An IS asset is a component of the IS supporting

3 business assets like a database where information is stored. In our context, and as described in the ISSRM literature [1], an IS is a composition of hardware, software, network, people and facilities. A security criterion characterises a property or constraint on business assets describing their security needs. The most common security criteria are confidentiality, integrity and availability. A security objective is the application of a security criterion on a business asset (e.g. the confidentiality of personal information). Risk-related concepts (white boxes) present how the risk itself is defined. A risk is the combination of an event with a negative impact harming the assets. A negative impact describes the potential negative consequence of an event that may harm assets of a system or organization, when an event causing this impact occurs. An event is the combination of a threat and one or more vulnerabilities. A vulnerability describes a characteristic of an IS asset or group of IS assets that can constitute a weakness or a flaw that can be exploited by a threat. A threat characterises a potential attack or incident, which targets one or more IS assets and may lead to the assets being harmed. A threat consists of a threat agent and an attack method. A threat agent is an agent that can potentially cause harm to IS assets. An attack method is a standard means by which a threat agent carries out a threat. Risk treatment-related concepts (dark grey boxes) describe what decisions, requirements and controls should be defined and implemented in order to mitigate possible risks. A risk treatment is an intentional decision to treat identified risks. A security requirement is a desired property of an IS that contributes to a risk treatment. Controls (countermeasures or safeguards) are a designed means to improve security, specified by a security requirement, and implemented to comply with it. 2.2 TOGAF TOGAF is a framework a detailed method and a set of supporting tools for developing an enterprise architecture [8]. It is a standard established and maintained by The Open Group, an industry consortium focused on IT standards. A key aspect of TOGAF is the TOGAF Architecture Development Method (ADM), a tested and repeatable process for developing architectures. The ADM includes establishing an architecture framework, developing architecture content, transitioning, and governing the realization of architectures. The TOGAF Architecture Content Framework (ACF) provides a structural model for architectural content, developed all along the different steps of the ADM, which allows major work products to be consistently defined, structured, and presented. The TOGAF ACF is structured according to its Content Metamodel. This metamodel is a single view that encompasses all four of the TOGAF architecture domains (Business, Data, Application; and Technology Architecture), and that defines a set of entities that allow architectural concepts to be captured, stored, filtered, queried, and represented in a way that supports consistency, completeness, and traceability. The TOGAF Content Metamodel and its associated glossary are of particular interest for the analysis performed in this paper. More information about TOGAF can be found in the TOGAF 9.1 reference book [8].

4 3 Conceptual Alignment Between Concepts of TOGAF and Concepts of the ISSRM Domain Model The conceptual alignment consists of identifying the semantic correspondence between concepts of TOGAF and concepts of the ISSRM domain model. This task has been performed by a focus group composed of five people. Three of them are ISSRM experts and two of them EAM experts. All of the members of the focus group are researchers having a good theoretical knowledge of ISSRM and/or EAM. Moreover, two ISSRM experts are also experienced ISSRM practitioners (in total during the 10 last years, they have performed more than 20 real-world applications of ISSRM in organizations, going from SMEs to European institutions). The EAM experts are practitioners in the discipline, regularly facing real challenges from enterprises, and one of them demonstrate proven experience in the application of the TOGAF framework: rolling out the ADM in large companies, setting up and customizing TOGAF repositories corporate-wide and in the scope of projects. Alignment decisions were taken only once a consensus has been found among the members of this focus group. 3.1 Alignment Approach The approach followed is inspired by Zivkovic et al. [9]. Each relation between concepts is classified according to the following semantic mapping subtypes: Equivalence: concept A is semantically equivalent to concept B; Generalisation: concept A is a generalisation of concept B, i.e. concept B is a specific class of concept A; Specialisation: concept A is a specialisation of concept B, i.e. concept B is a generic class of concept A; Aggregation: concept A is composed of concept B, i.e. concept B is a part of concept A; Composition: concept A is composed of concept B (with strong ownership), i.e. concept B is a part of concept A and does only exist as part of concept A; Association: concept A is linked to concept B. The output of this step is a table, highlighting the relations between the concepts of TOGAF and those of the ISSRM domain model. Such a table is presented in a technical report [10] which aims to perform similar work with other EAM references including ArchiMate, DoDAF and IAF. 3.2 Alignment Key Conclusions Based on the definitions of the TOGAF Content Metamodel [8], and the definitions of the concepts of the ISSRM domain [1, 6], the conceptual alignment aims at finding the structural and semantic correspondences of the concepts defined in TOGAF with

5 those of the ISSRM domain model. In other words, the alignment highlights the capabilities of the TOGAF approach to represent ISSRM concepts. A detailed analysis of the results of the mapping is given next. Most of the core concepts of Business Architecture in TOGAF are specific kinds of Business Assets. Capability is also considered as a Business Asset, although it is not part of Business Architecture concepts. All of the TOGAF concepts of the Data, Application, and Technology Architectures are specialisations of the concept of IS asset. More specifically, they are representing IT assets, i.e. IS assets of hardware, software or network kind. The only exception is Technology Component which is an abstract entity, as well as the concept of Business Service, which is a specialisation of Business asset. Data, Application, and Technology Architectures are adapted to represent an IT system, but are lacking people and facilities class of IS assets, necessary to define an IS in an information security context. However, they can be represented with the help of the following concepts of the Business Architecture: Organization Unit, Actor and Location. Event has no mapping with any ISSRM concept. It is defined as an organizational state change that triggers a Process, and has thus no correspondence with concepts of the ISSRM domain model. The ISSRM domain model aims indeed at identifying structural concepts at stake, and not at handling behavioural and methodological aspects of ISSRM. Gap and Work Package have also no mapping with any ISSRM concept. They are related to the project management aspects of architecture design and have thus no correspondence with concepts of the ISSRM domain model. Driver is a generalisation of the Security criterion concept. In our context, we have one main concern that is IS security, leading to drivers that are ISSRM security criteria (i.e., confidentiality, integrity, availability, etc.). Regarding our scope, the conditions that motivate the organization to define its (security) goals are related to the need of confidentiality, integrity or availability of information processed in the IS. In the same vain, the concepts of Goal and Objectives are a generalization of Security objective. Measure is considered as a generalisation of Risk, because a risk is a specific kind of measure. A risk is indeed an indicator or factor that can be tracked to determine success or alignment with Objectives and Goals (i.e. confidentiality, integrity and/or availability of Business Assets). Requirement is a generalization of Security requirement. The concepts of Principle (e.g., standard to be followed, regulation, etc.), Constraint (e.g., customer data is not harmonized within the organization) and Assumption (e.g., the application to be used shall be security certified) are associated with the concept of Asset, as well as Organization Unit and Role, because the latter can also be used to represent stakeholders (e.g. regulation organization, customers, shareholders, etc.). All of these concepts are indeed used in TOGAF to represent aspects considered as part of the environment of the assets and identified during the context establishment step of the ISSRM process [2].

6 Concepts currently composing the ISSRM domain model are the set of concepts used during risk assessment and risk treatment steps. To summarize, we can draw two main conclusions from the alignment. First, although the mapping is complex, TOGAF brings a more fine grained representation of (business and IS) assets than the ISSRM domain model. Second, TOGAF considers the concepts that are part of the environment of the assets. This is not the case of the ISSRM domain model. 4 EAM-ISSRM Integrated Model Proposal Based on TOGAF The preceding conceptual alignment between TOGAF and the ISSRM domain model, and more specifically the key conclusions coming from this alignment, have highlighted that a set of concepts of TOGAF, when used in an ISSRM context, are specialisations of ISSRM concepts: Fig. 1. EAM-ISSRM integrated model based on TOGAF The concepts of the Business architecture are specialisation of Business asset, except Location, Actor and Organization unit that are specialisation of IS asset. Capability is also a specialisation of Business asset.

7 The concepts of the Data, Application and Technology architecture are specialisation of IS assets except Technology Component that is an abstract entity. Some other concepts, always when used in an ISSRM context, are generalisations of ISSRM concepts: Security requirements are specific instances of Requirement. Risk is a specific instance of Measure. Security criterion is a specific instance of Driver Security objective is a specific instance of Goal or Objective. Finally, some EAM concepts of TOGAF have been identified as related to concepts of the ISSRM domain model: Assumption, Constraint, Principle, as well as Role and Organization Unit that are external to the IS (represented as ext_role and ext_organization unit in Fig. 1) are part of the environment of the assets studied. A new concept entitled Environment has been added to the model and is composed of the preceding concepts. The resulting EAM-ISSRM integrated model is shown in Fig. 1. It lies on the ISSRM domain model, depicting the state-of-the-art concepts of ISSRM, and is improved with EAM concepts, represented by black boxes with white names. In summary, a refinement of Business and IS assets has first been added, allowing to better model the complexity of current targets of ISSRM. Second, concepts related to the environment of the IS and thus to context establishment requirements have also been added. It helps to avoid that organizations provide insufficient ISSRM reports by bypassing some fundamental aspects of ISSRM, and allows also tackling our challenge of dealing with regulatory pressure involving ISSRM requirements. 5 Related Work The Open Group, in a white paper published in 2015 [11], analyses different approaches to modelling enterprise risk, as well as security concepts, based on ArchiMate 2.1. However, the scope of this white paper differs from our scope because they also consider non-security related risks (strategic, financial, project, etc.) with information security risks (i.e. risks harming confidentiality, integrity and availability of information). Barateiro et al. [12] propose an alignment between Risk Management, Governance and Enterprise Architecture activities in order to provide a systematic support to map and trace identified risks to artefacts modelled within an EA. Innerhofer-Oberperfler and Breu [13] propose an approach for the systematic assessment and analysis of IT-related risks in organizations and projects. The goal of the approach is to bridge the different views of the stakeholders involved in security management. SABSA [14] is a methodology for developing risk-driven enterprise information security and information assurance architectures and for delivering security infrastructure solutions that support critical business initiatives. The methodology relies on the SABSA model, which is based on the Zachman framework

8 [3] adapted somewhat to a security view. Goldstein and Franck have proposed a set of 23 requirements a modelling approach should satisfy to deal with IT security design and management [15]. We share the common objective to define a Domain Specific Modelling Language (DSML) enhancing an existing method for enterprise modelling. Their scope is wider as ours, but includes some basic and relevant aspects related to ISSRM. The CORAS approach is a model-driven approach in the sense that graphical models are actively used throughout the whole risk analysis process to support the various analysis tasks and activities, and to document the results [16]. However, CORAS introduces its own kinds of diagrams and does not rely on EAM models to perform ISSRM. As a conclusion, all of the preceding research works are providing some initial and promising inputs towards leveraging EAM to deal with security and/or RM issues. However, to the best of our knowledge, there is no extensive and mature research work trying to benefit from research in EAM to improve RM in the specific field of information security and proposing a complete and fully integrated conceptual model of both domains. 6 Conclusions and Future Work In this paper, we have described how we developed an integrated EAM-ISSRM conceptual model based on the ISSRM domain model and the TOGAF standard. First, we have analysed the concepts of TOGAF with regards to the concepts of the ISSRM domain model. The result of this analysis is presented under the form of a conceptual alignment table [10], highlighting the relations between the concepts of TOGAF and those of the ISSRM domain model. After having performed this alignment, the key conclusions are summarised, and then, an integrated EAM-ISSRM conceptual model has been established. As mentioned in the introduction, our work is part of a larger project, and is not limited to TOGAF, that is only one relevant EAM approach. Other references from the EAM literature will also be taken into account to be representative of the domain. To facilitate a high acceptance level of our extension by practitioners, we plan to focus on conceptual models that are used in practice. The EAM-ISSRM conceptual model will be iteratively improved when considering additional references. Then, after having established an integrated EAM-ISSRM conceptual model based on a representative set of references, it is necessary to validate the results obtained. To do so, we plan to get information about the utility and usability [17] of the EAM-ISSRM integrated model by means of a validation focus group. Acknowledgments. Supported by the Luxembourg National Research Fund, and financed by the ENTRI project (C14/IS/ ). 7 References 1. Mayer, N.: Model-based Management of Information System Security Risk, (2009).

9 2. ISO/IEC 27005:2011: Information technology Security techniques Information security risk management. International Organization for Standardization, Geneva (2011). 3. Zachman, J.A.: A framework for information systems architecture. IBM Syst. J. 26, (1987). 4. Saha, P. ed: A Systemic Perspective to Managing Complexity with Enterprise Architecture: IGI Global (2013). 5. Lankhorst, M.: Enterprise Architecture at Work - Modelling, Communication and Analysis. Springer Berlin Heidelberg (2013). 6. Dubois, E., Heymans, P., Mayer, N., Matulevičius, R.: A Systematic Approach to Define the Domain of Information System Security Risk Management. In: Nurcan, S., Salinesi, C., Souveyet, C., and Ralyté, J. (eds.) Intentional Perspectives on Information Systems Engineering. pp Springer Berlin Heidelberg, Berlin, Heidelberg (2010). 7. Mayer, N., Grandry, E., Feltus, C., Goettelmann, E.: Towards the ENTRI Framework: Security Risk Management enhanced by the use of Enterprise Architectures. In: Advanced Information Systems Engineering Workshops. Springer International Publishing (2015). 8. The Open Group: TOGAF Version 9.1. Van Haren Publishing, The Netherlands (2011). 9. Zivkovic, S., Kuhn, H., Karagiannis, D.: Facilitate Modelling Using Method Integration: An Approach Using Mappings and Integration Rules. In: Proceedings of the 15th European Conference on Information Systems (ECIS 2007) (2007). 10. Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E.: An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF. Technical Report. Available on demand. (2016). 11. Iver Band, Wilco Engelsman, Christophe Feltus, Sonia González Paredes, Jim Hietala, Henk Jonkers, Sebastien Massart: Modeling Enterprise Risk Management and Security with the ArchiMate Language. The Open Group (2015). 12. Barateiro, J., Antunes, G., Borbinha, J.: Manage Risks through the Enterprise Architecture. In: 45th Hawaii International Conference on System Science (HICSS). pp (2012). 13. Innerhofer-Oberperfler, F., Breu, R.: Using an Enterprise Architecture for IT Risk Management. Presented at the Information Security South Africa 6th Annual Conference (2006). 14. John Sherwood, Andrew Clark, David Lynas: SABSA Enterprise Security Architecture, (2010). 15. Goldstein, A., Frank, U.: A Language for Multi-Perspective Modelling of IT Security: Objectives and Analysis of Requirements. In: La Rosa, M. and Soffer, P. (eds.) Business Process Management Workshops. pp Springer Berlin Heidelberg (2013). 16. Bjørnar Solhaug, Ketil Stølen: The CORAS Language - why it is designed the way it is. In: Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures. pp CRC Press (2014). 17. Nielsen, J.: Usability Engineering. Morgan Kaufmann (1994).

Challenges of Capturing Design Rationales in Enterprise Architecture: A case study

Challenges of Capturing Design Rationales in Enterprise Architecture: A case study Challenges of Capturing Design Rationales in Enterprise Architecture: A case study Georgios Plataniotis 1,2,4, Sybren de Kinderen 3,4, and Henderik A. Proper 1,2,4 1 Public Research Centre Henri Tudor,

More information

CSPA within the Enterprise Architecture (part 1)

CSPA within the Enterprise Architecture (part 1) CSPA within the Enterprise Architecture (part 1) Mauro Bruno THE CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION Outline The problem statement EA main features EA frameworks

More information

Risk modeling by custom extensions to Archimate Experimental extensions towards a complete EA framework

Risk modeling by custom extensions to Archimate Experimental extensions towards a complete EA framework Risk modeling by custom extensions to Archimate Experimental extensions towards a complete EA framework Erik Hagen June 2014 Contact: erik.hagen@entercard.com EnterCard delivers smart payment and financing

More information

ArchiMate Extension for Modeling and Managing Motivation, Principles, and Requirements in TOGAF

ArchiMate Extension for Modeling and Managing Motivation, Principles, and Requirements in TOGAF ArchiMate Extension for Modeling and Managing Motivation, Principles, and Requirements in TOGAF A White Paper by: Wilco Engelsman, Henk Jonkers, and Dick Quartel February 2011 Copyright 2011 The Open Group

More information

Toolbox for Architecture Framework Discussions at The Open Group. SKF Group, February 2018

Toolbox for Architecture Framework Discussions at The Open Group. SKF Group, February 2018 Toolbox for Architecture Framework Discussions at The Open Group SKF Group, February 2018 Toolbox Overview Components in our Enterprise Architecture Management: APPROACH FRAMEWORK CONTENT TOOLBOX Architecture

More information

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and Enterprise Architecture is a holistic view of an enterprise s processes, information and information technology assets as a vehicle for aligning business and IT in a structured, more efficient and sustainable

More information

TOGAF 9.1 Phases E-H & Requirements Management

TOGAF 9.1 Phases E-H & Requirements Management TOGAF 9.1 Phases E-H & Requirements Management By: Samuel Mandebvu Sources: 1. Primary Slide Deck => Slide share @ https://www.slideshare.net/sammydhi01/learn-togaf-91-in-100-slides 1. D Truex s slide

More information

Enterprise Architecture Dealing with Complexity and Change

Enterprise Architecture Dealing with Complexity and Change member of Enterprise Architecture Dealing with Complexity and Change Introduction to Business-IT Alignment and Enterprise Architecture 1 Drivers for Change can be internal and external External Drivers

More information

An Extension of Business Process Model and Notation for Security Risk Management

An Extension of Business Process Model and Notation for Security Risk Management UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE INSTITUTE OF COMPUTER SCIENCE Olga Altuhhova An Extension of Business Process Model and Notation for Security Risk Management Master s thesis

More information

Enterprise Architecture ROI What are the IS quality criteria to enforce?

Enterprise Architecture ROI What are the IS quality criteria to enforce? Enterprise Architecture ROI What are the IS quality criteria to enforce? In order to avoid generating an IT tunnel effect when deploying an Enterprise Architecture program, a company has to define its

More information

Enterprise Architecture Management. Prof. Dr. Knut Hinkelmann MSc Business Information Systems

Enterprise Architecture Management. Prof. Dr. Knut Hinkelmann MSc Business Information Systems Literature This chapter is based on the following literature: F. Ahlemann et al. (eds.), Strategic Enterprise Architecture Management: Challenges, Best Practices, and Future Developments, Springer-Verlag

More information

Information Systems for the Compliance of Service Systems Prof. Dr. Eric Dubois (Service Science & Innovation department)

Information Systems for the Compliance of Service Systems Prof. Dr. Eric Dubois (Service Science & Innovation department) Information Systems for the Compliance of Service Systems Prof. Dr. Eric Dubois (Service Science & Innovation department) The content of the contribution in a nutshell We have eco-systems of -oriented

More information

Modeling ISO using Archimate

Modeling ISO using Archimate Modeling ISO 31000 using Archimate Abstract Organizations are subject to a set of internal and external factors that may have a negative effect on the achievement of their objectives. These uncertain effects

More information

Useful EAM-Standards and Best-Practice Frameworks

Useful EAM-Standards and Best-Practice Frameworks Useful EAM-Standards and Best-Practice Frameworks 29.06.2016, Prof. Dr. Florian Matthes Software Engineering für betriebliche Informationssysteme (sebis) Fakultät für Informatik Technische Universität

More information

TOGAF 9 Training: Foundation

TOGAF 9 Training: Foundation TOGAF 9 Training: Foundation Part I: Basic Concepts Document version control information Document Name Document Status Document Owner Part I: Basic Concepts Final IT Management Group TOGAF Lead Trainer

More information

Certkiller.OG questions

Certkiller.OG questions Certkiller.OG0-021.80 questions Number: OG0-021 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ OG0-021 ArchiMate 2 Part 1 Examination It guided me step by step through

More information

Objective (c.f., p.58)

Objective (c.f., p.58) TOGAF 9.1 CIS 8090 Session #4 Chapter 6 Preliminary Phase Chapter 7 Phase 4 Architecture Vision Part III Chapter 18 Introduction to ADM Guidelines and Techniques Sources: 1. Primary Slide Deck By: Samuel

More information

TOGAF Foundation Exam

TOGAF Foundation Exam TOGAF Foundation Exam TOGAF 9 Part 1 (ESL) Time Limit 90 minutes Number of questions 40 Pass-through 22 1. Which of the following best describes the meaning of "Initial Level of Risk" in Risk Management?

More information

Enterprise Architecture: an ideal discipline for use in Supply Chain Management

Enterprise Architecture: an ideal discipline for use in Supply Chain Management Enterprise Architecture: an ideal discipline for use in Supply Chain Management Richard Freggi Senior Supply Chain Architect (TOGAF 9.1 certified level 2) HP Inc. Content Understanding Supply Chain Management

More information

A Semi-formal Evaluation of Architecture Design Based on Architecture Principles

A Semi-formal Evaluation of Architecture Design Based on Architecture Principles A Semi-formal Evaluation of Architecture Design Based on Architecture Principles Diana Marosin 1, Sepideh Ghanavati 2 1 Radboud University Nijmegen, Nijmegen, the Netherlands 2 Texas Tech University, Lubbock,

More information

ArchiMate 3.0: A New Standard for Architecture. Marc Lankhorst Iver Band

ArchiMate 3.0: A New Standard for Architecture. Marc Lankhorst Iver Band ArchiMate 3.0: A New Standard for Architecture Marc Lankhorst Iver Band Marc M. Lankhorst Chief Evangelist +31 6 44 092 359 m.lankhorst@bizzdesign.com http://nl.linkedin.com/in/marclankhorst BiZZdesign

More information

TABLE OF CONTENTS 2. INFORMATION TECHNOLOGY IN A BUSINESS ENVIRONMENT 15

TABLE OF CONTENTS 2. INFORMATION TECHNOLOGY IN A BUSINESS ENVIRONMENT 15 . INTRODUCTION. INFORMATION TECHNOLOGY IN A BUSINESS ENVIRONMENT.. THE ORGANIZATION AS A SYSTEM...... Business processes...................................................... The value chain...... Value

More information

Alignment of Business and IT by Enterprise Architecture Management

Alignment of Business and IT by Enterprise Architecture Management member of Alignment of Business and IT by Enterprise Architecture Management Literature This chapter is based on the following literature: F. Ahlemann et al. (eds.), Strategic Enterprise Architecture Management:

More information

Case presentation TOGAF and ArchiMate for. April, 2012 Henry Franken - BiZZdesign

Case presentation TOGAF and ArchiMate for. April, 2012 Henry Franken - BiZZdesign Case presentation TOGAF and ArchiMate for Successful Enterprise Architecture April, 2012 Henry Franken - BiZZdesign Henry Franken 45 years old, M.Sc. & Ph.D. (cum laude) Happy in life Co-founder & manager

More information

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2 Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our

More information

VIEWPOINTS ON INSPIRE ARCHITECTURE

VIEWPOINTS ON INSPIRE ARCHITECTURE VIEWPOINTS ON INSPIRE ARCHITECTURE Jerzy Gazdzicki INSPIRE 2010 KRAKÓW 1. INTRODUCTION CONTENTS 2. ARCHITECTURE MODELING BASED ON ISO/IEC 42010:2007 3. ARCHITECTURE FRAMEWORKS 4. TIERS OF INSPIRE ARCHITECTURE

More information

Deriving SOA Evaluation Metrics in an Enterprise Architecture Context

Deriving SOA Evaluation Metrics in an Enterprise Architecture Context Deriving SOA Evaluation Metrics in an Enterprise Architecture Context Stephan Aier 1, Maximilian Ahrens 2, Matthias Stutz 1, and Udo Bub 2 1 University of St.Gallen, Switzerland {Stephan.Aier,Matthias.Stutz}@unisg.ch

More information

Explicitly Modelling Relationships of Risks on Business Architecture

Explicitly Modelling Relationships of Risks on Business Architecture echallenges e-2014 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2014 ISBN: 978-1-905824-45-8 Explicitly Modelling Relationships

More information

Extending Business Motivation Modelling to Foster Regional Flexibility in IT Architecture Management

Extending Business Motivation Modelling to Foster Regional Flexibility in IT Architecture Management echallenges e-2013 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2013 ISBN: 978-1-905824-40-3 Extending Business Motivation Modelling

More information

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests.

Translate stakeholder needs into strategy. Governance is about negotiating and deciding amongst different stakeholders value interests. Principles Principle 1 - Meeting stakeholder needs The governing body is ultimately responsible for setting the direction of the organisation and needs to account to stakeholders specifically owners or

More information

The SOA Working Group

The SOA Working Group The SOA Working Group San Francisco Thursday, January 31, 2008 Tony Carrato, SOA WG Co-Chair The SOA Working Group The mission of The Open Group SOA Working Group is to develop and foster common understanding

More information

Actionable enterprise architecture management

Actionable enterprise architecture management Enterprise architecture White paper June 2009 Actionable enterprise architecture management Jim Amsden, solution architect, Rational software, IBM Software Group Andrew Jensen, senior product marketing

More information

Enterprise Architecture Management

Enterprise Architecture Management Enterprise Architecture Management Knut Hinkelmann Enterprise Architecture is not about building models. It is about solving enterprise problems while iteratively building models John Zachman Enterprise

More information

Security Today. Shon Harris. Security consultant, educator, author

Security Today. Shon Harris. Security consultant, educator, author Security Today Shon Harris Security consultant, educator, author 360 Security Model Holistic Approach to Security Every Organization has these EXACT issues The responsibility of securing an organization

More information

TOGAF Foundation. Part I: Basic Concepts 1 /

TOGAF Foundation. Part I: Basic Concepts 1 / TOGAF Foundation Part I: Basic Concepts 1 / Enterprise and Enterprise Architecture An Enterprise is any collection of organizations that has a common set of goals, for example: Government agency Whole

More information

A META-MODEL FOR THE SPATIAL CAPABILITY ARCHITECTURE

A META-MODEL FOR THE SPATIAL CAPABILITY ARCHITECTURE A META-MODEL FOR THE SPATIAL CAPABILITY ARCHITECTURE JOSEF MIKLOŠ Software AG Institute of Geoinformatics, VŠB - Technical University of Ostrava E-mail: josef.miklos@centrum.cz ABSTRACT It is observed

More information

( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################!

( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################! "$%&'% ( %)'* + " $%&'(&)*)')%&&+), " (&)*)')%&&+)(&-( "" (&)*)')%&&+)*)-.)/0 " (&)*)')%&&+)*)-.)/$1 + '%, - "%&&%. 0 /(.(.&%(&)*)'23-(&%2-+()'4 0 &%5&((&)*)'()-(/(&4 / 0$%'% 1 -+'(.-(6.(/(&6&-((26&3&-/*6/(&,

More information

Successful Strategies of Digital Transformation through Capabilities Innovations

Successful Strategies of Digital Transformation through Capabilities Innovations 1 Successful Strategies of Digital Transformation through Capabilities Innovations Hasan Ganny bin Hanif Francis Chairman, AEA Malaysia Chapter hasan.ganny@atdsolution.com Presentation Outline 1 Successful

More information

Business Architecture Value Proposition: BIZBOK Guide and TOGAF Standard

Business Architecture Value Proposition: BIZBOK Guide and TOGAF Standard Download this and other resources @ http://www.aprocessgroup.com/myapg Business Architecture Value Proposition: BIZBOK Guide and TOGAF Standard AEA Webinar Series Enterprise Business Intelligence Armstrong

More information

Architecture Evaluation Methods. AISA Project Report. Version: 2.0 Author: Martin Hoffmann. Date: Status: Final

Architecture Evaluation Methods. AISA Project Report. Version: 2.0 Author: Martin Hoffmann. Date: Status: Final Architecture Evaluation Methods Report Version: 2.0 Author: Martin Hoffmann Date: 2.5.2007 Status: Final Summary This paper aims at presenting the current possibilities to evaluate enterprise and software

More information

Integration of Business Decision Modeling in Organization Design

Integration of Business Decision Modeling in Organization Design Publication date: August 7, 2013 Integration of Business Decision Modeling in Organization Design Henk Jonkers Dick Quartel Harmen van den Berg Henry Franken Copyright 2013 by BiZZdesign. All rights reserved.

More information

From the Decision Support on the Ground to the Decision Support in the Cloud

From the Decision Support on the Ground to the Decision Support in the Cloud From the Decision Support on the Ground to the Decision Support in the Cloud Aida Omerovic, SINTEF ICT Valencia, Spain May 29 th 2013 1 Outline Why decision support What we have on the ground What we need

More information

Enterprise Architecture Introduction

Enterprise Architecture Introduction Master of Science Business Information Systems Enterprise Architecture Introduction Chapter 1: Introduction to Enterprise Architecture Motivation:Strategic IT Management Agility Business-IT Alignment Approach:

More information

A Kind of Summary: Enterprise Architecture for Business-IT Alignment. Prof. Dr. Knut Hinkelmann MSc Business Information Systems

A Kind of Summary: Enterprise Architecture for Business-IT Alignment. Prof. Dr. Knut Hinkelmann MSc Business Information Systems A Kind of Summary: Enterprise Architecture for Business-IT Alignment Model Languages and Architectures Overall ArchiMate, (BMM) Business Architecture BPMN, CMMN, Organisation, Process Map, BMM, Products

More information

Supporting the Design of a Management Accounting System of a Company Operating in the Gas Industry with Business Process Modeling

Supporting the Design of a Management Accounting System of a Company Operating in the Gas Industry with Business Process Modeling Supporting the Design of a Management Accounting System of a Company Operating in the Gas Industry with Business Process Modeling Nikolaos A. Panayiotou and Ilias P. Tatsiopoulos National Technical University

More information

Risk Management Using Spiral Model for Information Technology

Risk Management Using Spiral Model for Information Technology Risk Management Using Spiral Model for Information Technology Rajendra Ganpatrao Sabale, Dr. A.R Dani Student of Ph.D., Singhania University, Pacheri Bari, Dist. Jhunjhunu( Rajasthan), India International

More information

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques

Book Outline. Software Testing and Analysis: Process, Principles, and Techniques Book Outline Software Testing and Analysis: Process, Principles, and Techniques Mauro PezzèandMichalYoung Working Outline as of March 2000 Software test and analysis are essential techniques for producing

More information

Integral Architecture for Organizational Systems Arquetipos

Integral Architecture for Organizational Systems Arquetipos Integral Architecture for Organizational Systems Arquetipos Ana Milena Páez Quintero1*, Ricardo Llamosa Villalba2, Edgar Sneyder García Morantes2 Innovation and Development Center for Software Engineering

More information

Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces

Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces Aligning TOGAF and NAF Experiences from the Norwegian Armed Forces Håvard Jørgensen Tore Liland Stein Skogvold havard.jorgensen@commitment.no, tliland@mil.no, stein.skogvold@acando.com Objectives and Background

More information

Business IT Alignment from Business Model to Enterprise Architecture

Business IT Alignment from Business Model to Enterprise Architecture Business IT Alignment from Business Model to Enterprise Architecture Boris Fritscher 1 and Yves Pigneur University of Lausanne, 1015 Lausanne, Switzerland, boris.fritscher@unil.ch Abstract. In this paper,

More information

MOTIVATION ISSUES IN THE FRAMEWORK OF INFORMATION SYSTEMS ARCHITECTURE

MOTIVATION ISSUES IN THE FRAMEWORK OF INFORMATION SYSTEMS ARCHITECTURE UDC:007.5 Preliminary communication MOTIVATION ISSUES IN THE FRAMEWORK OF INFORMATION SYSTEMS ARCHITECTURE Mladen Varga University of Zagreb Faculty of Economics, Zagreb mladen.varga@efzg.hr Abstract.

More information

Design of an Integrated Model for Development of Business and Enterprise Systems

Design of an Integrated Model for Development of Business and Enterprise Systems International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 5, May 2015, PP 50-57 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Design

More information

Motivation Issues in the Framework of Information Systems Architecture

Motivation Issues in the Framework of Information Systems Architecture 1 Motivation Issues in the Framework of Information Systems Architecture Mladen Varga University of Zagreb Faculty of Economics, Zagreb mladen.varga@efzg.hr Abstract. The Zachman Framework for information

More information

The ArchiMate modelling structures

The ArchiMate modelling structures The ArchiMate modelling structures Monica Scannapieco ESTP Training Course Enterprise Architecture and the different EA layers, application to the ESS context Advanced course Rome, 11 14 October 2016 THE

More information

An overview of The Open Group's Enterprise Architecture and Evolution of IT4IT

An overview of The Open Group's Enterprise Architecture and Evolution of IT4IT An overview of The Open Group's Enterprise Architecture and Evolution of IT4IT Krishnamoorthy Marimuthu 1, Dr. V.Prasanna Venkatesan 2 1 BI Architect, Tata Consultancy Services, Chennai, India 2 Head-Dept.

More information

TOGAF 9.1 in Pictures

TOGAF 9.1 in Pictures TOGAF 9. in Pictures The TOGAF ADM Cycle Stage Set up an EA team and make sure it can do its work The ADM is about understanding existing architectures and working out the best way to change and improve

More information

A Measurement Approach Integrating ISO 15939, CMMI and the ISBSG

A Measurement Approach Integrating ISO 15939, CMMI and the ISBSG A Measurement Approach Integrating ISO 15939, CMMI and the ISBSG Luc Bégnoche, Alain Abran, Luigi Buglione Abstract In recent years, a number of well-known groups have developed sets of best practices

More information

Enterprise Architecture Modelling with ArchiMate

Enterprise Architecture Modelling with ArchiMate Enterprise Architecture Modelling with ArchiMate Marc Lankhorst Principal Researcher Enterprise Architecture Utrecht University, January 11, 2010 Overview Introduction Enterprise architecture The ArchiMate

More information

ALIGNMENT OF REMMO WITH RBAC TO MANAGE ACCESS RIGHTS IN THE FRAME OF ENTERPRISE ARCHITECTURE CHRISTOPHE FELTUS, ERIC DUBOIS, MICHAËL PETIT

ALIGNMENT OF REMMO WITH RBAC TO MANAGE ACCESS RIGHTS IN THE FRAME OF ENTERPRISE ARCHITECTURE CHRISTOPHE FELTUS, ERIC DUBOIS, MICHAËL PETIT ALIGNMENT OF REMMO WITH RBAC TO MANAGE ACCESS RIGHTS IN THE FRAME OF ENTERPRISE ARCHITECTURE CHRISTOPHE FELTUS, ERIC DUBOIS, MICHAËL PETIT OVERVIEW Introduction Responsibility metamodel ArchiMate extension

More information

Modelling Languages Restrictions: A Comparative Study of ArchiMate and SOMF

Modelling Languages Restrictions: A Comparative Study of ArchiMate and SOMF Modelling Languages Restrictions: A Comparative Study of ArchiMate and SOMF João Gonçalves Henriques 1, Pedro Carmo Oliveira 2 and Miguel Mira da Silva 1 1 Instituto Superior Técnico, Portugal {joaoltghenriques,

More information

P F 2. The Pragmatic Operating model for Enterprise Transformation. Pragmatic. v1.3a April Connecting the DOTS

P F 2. The Pragmatic Operating model for Enterprise Transformation. Pragmatic. v1.3a April Connecting the DOTS The Pragmatic Operating model for Transformation Pragmatic E N T E R P R I S E A R C H I T E C T U R E v1.3a April 017 P F Connecting the DOTS Part of the Pragmatic Family of Frameworks Context Context

More information

Building an Effective Enterprise Architecture Capability

Building an Effective Enterprise Architecture Capability Publication date: September 26, 2013 Building an Effective Enterprise Architecture Capability Using TOGAF and The Grip Approach Sven van Dijk Iver Band Henry Franken Bas van Gils Rob Kroese Reviews by:

More information

The Role of Conceptual Modeling in Managing and Changing the Business

The Role of Conceptual Modeling in Managing and Changing the Business The Role of Conceptual Modeling in Managing and Changing the Business Carson Woo Sauder School of Business University of British Columbia Five Minutes Summary Conceptual modeling main use: IS development

More information

Business Capabilities as Formalised Social Systems

Business Capabilities as Formalised Social Systems Business Capabilities as Formalised Social Systems By Graham Berrisford What are the essential elements of a society? The sociological tradition suggests two alternatives: either [actors] or activities.

More information

Information and Software Technologies. Tomas Skersys Rimantas Butleris Rita Butkiene (Eds.)

Information and Software Technologies. Tomas Skersys Rimantas Butleris Rita Butkiene (Eds.) Tomas Skersys Rimantas Butleris Rita Butkiene (Eds.) Communications in Computer and Information Science 403 Information and Software Technologies 9th International Conference, ICIST 203 Kaunas, Lithuania,

More information

Knowledge mechanisms in IEEE 1471 & ISO/IEC Rich Hilliard

Knowledge mechanisms in IEEE 1471 & ISO/IEC Rich Hilliard Knowledge mechanisms in IEEE 1471 & ISO/IEC 42010 Rich Hilliard r.hilliard@computer.org Two Themes Knowledge mechanisms in IEEE 1471 and ISO/IEC 42010 2000 edition and on-going revision Toward a (bigger)

More information

Designing Software Ecosystems. How Can Modeling Techniques Help? Mahsa H. Sadi, Eric Yu. 1 Introduction. 2 Modeling Requirements.

Designing Software Ecosystems. How Can Modeling Techniques Help? Mahsa H. Sadi, Eric Yu. 1 Introduction. 2 Modeling Requirements. Introduction Ecosystems Mahsa H. Sadi, Department of Computer Science University of Toronto E mail: mhsadi@cs.toronto.edu Exploring Modeling Methods for Systems Analysis and Design (EMMSAD) Working Conference

More information

Practical Company Organization Modeling Guide

Practical Company Organization Modeling Guide Objecteering Practical Guides Practical Company Organization Modeling Guide Author: Version: 1.0 Copyright: Softeam Softeam Consulting Team Supervised by Philippe Desfray Softeam 21 avenue Victor Hugo

More information

CGEIT Certification Job Practice

CGEIT Certification Job Practice CGEIT Certification Job Practice Job Practice A job practice serves as the basis for the exam and the experience requirements to earn the CGEIT certification. This job practice consists of task and knowledge

More information

Using Enterprise Architecture as a template of analysis

Using Enterprise Architecture as a template of analysis Using Enterprise Architecture as a template of analysis Dr. Shadrack Katuu Research Fellow, Department of Information Science University of South Africa Outline 1. Background information 2. Phases of the

More information

Avancier Methods (AM) Initiation and Context diagrams

Avancier Methods (AM) Initiation and Context diagrams Methods (AM) Initiation and Context diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission

More information

Model-Based Enterprise Information System Architectural Design with SysML

Model-Based Enterprise Information System Architectural Design with SysML 9th International Conference on Research Challenges in Information Science, May 13-15 2015, Athens, Greece Doctoral Consortium Model-Based Enterprise Information System Architectural Design with SysML

More information

Information governance for the real world

Information governance for the real world Information governance for the real world 1 2 Information governance is the activities and technologies that organizations employ to maximize the value of their information while minimizing associated

More information

TOGAF and SABSA Integration

TOGAF and SABSA Integration TOGAF and SABSA Integration How SABSA and TOGAF complement each other to create better architectures A White Paper by: The Open Group TOGAF-SABSA Integration Working Group, comprising leading representatives

More information

Rational Enterprise Architecture

Rational Enterprise Architecture Rational Enterprise Architecture Leendert van der Torre 1(B) and Marc van Zee 2 1 University of Luxembourg, Luxembourg City, Luxembourg leon.vandertorre@uni.lu 2 Google Research, Zurich, Switzerland marcvanzee@google.com

More information

Information Architecture Creating a framework for measuring architecture

Information Architecture Creating a framework for measuring architecture MASTER THESIS Plan of Approach Information Architecture Creating a framework for measuring architecture Authors : P.J. van Vlaanderen, B Ict G. Chorus, B Ict Ing. D.S. Campbell Y. Janse, B Ict Ing. R.

More information

A Metamodel for Collaboration Formalization

A Metamodel for Collaboration Formalization A Metamodel for Collaboration Formalization Loïc Bidoux 1,2, Frédérick Bénaben 1, and Jean-Paul Pignon 2 1 Mines Albi Université de Toulouse {loic.bidoux,frederick.benaben}@mines-albi.fr 2 Customer Innovation

More information

Business Process Modelling Perspectives Analysis

Business Process Modelling Perspectives Analysis Business Process Modelling Perspectives Analysis Renate Strazdina and Marite Kirikova Riga Technical University Kalku iela 1, Riga, LV-1010 {Renate.Strazdina,Marite.Kirikova}@cs.rtu.lv Abstract. Business

More information

Information Systems Architecture and Enterprise Modeling. Prof. Dr. Knut Hinkelmann

Information Systems Architecture and Enterprise Modeling. Prof. Dr. Knut Hinkelmann Information Systems Architecture and Enterprise Modeling Chapter 1: Introduction to Enterprise Architecture Motivation: Business IT Alignment Challenge: Agility Approach Enterprise Architecture Transparency

More information

Architectural Representations for Describing Enterprise Information and Data

Architectural Representations for Describing Enterprise Information and Data Architectural Representations for Describing Enterprise Information and Data ZAIGHAM MAHMOOD School of Computing University of Derby Kedleston Road, Derby, DE22 1GB UK Abstract: - Enterprise Architecture

More information

Exam Questions OG0-093

Exam Questions OG0-093 Exam Questions OG0-093 OG0-093 TOGAF 9 Combined Part 1 and Part 2 https://www.2passeasy.com/dumps/og0-093/ 1. Which of the following TOGAF components was created to enable architects to design architectures

More information

September 17, 2012 Pittsburgh ISACA Chapter

September 17, 2012 Pittsburgh ISACA Chapter September 17, 2012 Pittsburgh ISACA Chapter What is COBIT? Control Objectives for Information and related Technologies ISACA s guidance on the enterprise governance and management of IT. Builds on more

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see Business Analysis - Based on BABOK Guide Version 2 A Pocket Guide Other publications by Van Haren Publishing Van Haren Publishing (VHP) specializes in titles on Best Practices, methods and standards within

More information

TOGAF - The - The Continuing Story Story

TOGAF - The - The Continuing Story Story TOGAF - The - The Continuing Story Story The Open Group Framework (TOGAF) Presented by Chris Greenslade Chris@Architecting-the-Enterprise.com 1 of 53 TA P14 1 The questions to answer Who are we? What principles

More information

Business Architecture Fundamentals

Business Architecture Fundamentals Course Description 3 day - expert led hands-on In this turbulent and increasingly competitive global economy, and the rapid pace of change in business models involving changing technology and customer

More information

Expanding the Discipline of Enterprise Architecture Modeling to Business Intelligence with EA4BI

Expanding the Discipline of Enterprise Architecture Modeling to Business Intelligence with EA4BI Expanding the Discipline of Enterprise Architecture Modeling to Business Intelligence with EA4BI Rudi Claes Inno.com Institute, Beerzel, Belgium Abstract. The current mainstream enterprise architecture

More information

TOGAF usage in outsourcing of software development

TOGAF usage in outsourcing of software development Acta Informatica Pragensia 2(2), 2013, 68 76, ISSN 1805-4951 Section: Online: aip.vse.cz Peer-reviewed papers TOGAF usage in outsourcing of software development Aziz Ahmad Rais 1, Rudolf Pecinovsky 1 1

More information

Given the competitive importance of

Given the competitive importance of Making Work A successful measurement process becomes a way of doing business. is embedded in the organization, and performance improves because people are making fact-based decisions. This article describes

More information

Misalignment Symptom Detection with XML-based Enterprise Architecture Model Analysis

Misalignment Symptom Detection with XML-based Enterprise Architecture Model Analysis 153 Misalignment Symptom Detection with XML-based Enterprise Architecture Model Analysis Dóra Őri 1 Abstract: This novel directions talk deals with the concept of misalignment, with special attention on

More information

Comparison of Common Criteria and CORAS *

Comparison of Common Criteria and CORAS * Comparison of Common Criteria and CORAS * Soop Oliver This essay gives an overview of the two security risk management approaches that are widely used, Common Criteria and CORAS. Both of the approaches

More information

Knowledge Management Support for Enterprise Architecture Development

Knowledge Management Support for Enterprise Architecture Development Knowledge Management Support for Enterprise Architecture Development Adi Wibowo Abstract Knowledge Management (KM) has become an important part of organization s competitive strategy. KM in general has

More information

EVALUATION OF ARIS AND ZACHMAN FRAMEWORKS AS ENTERPRISE ARCHITECTURES

EVALUATION OF ARIS AND ZACHMAN FRAMEWORKS AS ENTERPRISE ARCHITECTURES UDC: 004.45 Original scientific paper EVALUATION OF ARIS AND ZACHMAN FRAMEWORKS AS ENTERPRISE ARCHITECTURES Melita Kozina University of Zagreb,Faculty of Organization and Informatics, Varaždin, Croatia

More information

Title: Integrating EA into the Full Information Systems Life Cycle

Title: Integrating EA into the Full Information Systems Life Cycle Presentation to: Architecture Practitioners Conference Title: Integrating EA into the Full Information Systems Life Cycle 1 John J. Keane, Jr. M.S. Computer Science, MBA ITIL Foundation Chief Information

More information

An Analysis of Safety Evidence Management with the Structured Assurance Case Metamodel

An Analysis of Safety Evidence Management with the Structured Assurance Case Metamodel 2016. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ It is a preprint of the article http://dx.doi.org/10.1016/j.csi.2016.10.002

More information

TOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION

TOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION 1 2 Objectives of Systems Engineering 3 4 5 6 7 8 DoD Policies, Regulations, & Guidance on Systems Engineering Roles of Systems Engineering in an Acquisition Program Who performs on an Acquisition Program

More information

A Catalogue of Non-Technical Requirement Patterns

A Catalogue of Non-Technical Requirement Patterns A Catalogue of Non-Technical Requirement Patterns Cristina Palomares 1, Carme Quer 1, Xavier Franch 1, Cindy Guerlain 2, Samuel Renault 2 1 Universitat Politècnica de Catalunya (UPC), Barcelona, Catalunya,

More information

Development of a Process Assessment Model for assessing Medical IT Networks against IEC

Development of a Process Assessment Model for assessing Medical IT Networks against IEC Development of a Process Assessment Model for assessing Medical IT Networks against IEC 80001-1 Silvana Togneri MacMahon 1, Fergal Mc Caffery 1, Sherman Eagles 2, Frank Keenan 1, Marion Lepmets 3, Alain

More information

DSMLs for Enterprise Architecture Management

DSMLs for Enterprise Architecture Management DSMLs for Enterprise Architecture Management Review of Selected Approaches Heiko Kattenstroth Information Systems and Enterprise Modeling Research Group Institute for Computer Science and Business Information

More information

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3

IIBA Global Business Analysis Core Standard. A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 IIBA Global Business Analysis Core Standard A Companion to A Guide to the Business Analysis Body of Knowledge (BABOK Guide) Version 3 International Institute of Business Analysis, Toronto, Ontario, Canada.

More information